User - what is it and what is it for?
The lexicon of the Internet has firmly come to lifemodern generation. Along with new words, English terms are often used, which sometimes puzzle inexperienced users. One such word is user. What is this concept, where it is used, we learn in this article.
The first years of life the Internet did not conceal in itself anythreats to its users. Computers were few, active users - even less. Identification of site visitors seemed to be an unnecessary precaution. But only a few years later everything changed.
In the network appeared a lot of scammers,personal data of visitors. And the further, the more serious the threat: the network received confidential pictures and letters, violating the law of privacy. So the first user appeared. What is this option, I had to learn many, and very quickly.
Possibility of registration
Many sites introduced the registration option for theirregular visitors, offering them the best opportunities to obtain information, download content and other privileges. Now every visitor to the site knew what is user-friendly. An example of standard registration is the filling of the fields "login" and "password". This was how the visitor was identified, after which he could use all the possibilities of the web resource.
Login and password
Initially, the user to implementauthorization, it was enough to come up with a username and password. Login included a simple nickname, consisting of letters and numbers - a kind of nickname for the user, according to which he could be recognized on the network. The login is also known as a username. Translation of this word into Russian is the "user name". The password should have included a combination of letters and numbers that other visitors can not access. There are even standard passwords, for example, eight keystrokes of the "space" key or the well-known combination of qwerty, as a symbol of carelessness of the first username media. In Russian there is no similar meaning of a fun password, its literal translation is not possible, but such a sonorous name is easy to remember, as it is simply typed in the upper letter of the English keyboard.
From now on, every visitor should have known thatsuch a user. An example of using the login and password was picked up by all sites. Over time, the requirements of confidentiality have become tougher, the responsibility for the reliability of the password is borne by someone who uses the user's password. That this is very important, many were convinced, when in the legal practice began to appear processes over unscrupulous users who used someone else's profiles for fraudulent purposes.
Later came up with more sophisticated systemssecurity. Especially it concerned Internet terminals and personal banking users' offices. Many people who use electronic payment systems have been re-registered on websites. Now you needed to bind the login to the email address. Later, they requested a link to the mobile phone. Many banks to enter the system send a one-time password in SMS. So the safety of the resource increased, and the visitor was asked to pass authorization either by login or by e-mail: username or email.
The requirements for the password for logging into the system have also increased. Now for authorization, more complex combinations are needed. The user identification process can occur as follows.
The system prompts the user to select a password,consisting of uppercase, uppercase letters. After the first login to the system, the site automatically sends to the user's email address the chosen login and password.
The system generates a one-time password and sendsits user. The password is valid only for a short period of time. After entering the system, the user is asked to enter a more convenient password. If the password is lost, this procedure is repeated anew.
The system itself generates a password and username. The transfer of the user to a more convenient identification system occurs only after the profile is linked to a social network.
Each method has its advantages and disadvantages. The big inconvenience of the generated passwords is compensated by their reliability. Simple passwords are easy to remember, but even easier to pick up. Therefore, the golden mean here, everyone chooses for himself.
How can I use the user?
Strangely enough, but many do not even guess,how can you use it, that it's a great way to learn more about a person. You just need to type his nickname in the browser's search bar. Most users are reluctant to change their user experience, preferring to register under the same login on all their favorite pages.
In our country the Cyrillic alphabet is used. For the computer, Latin and Cyrillic are two completely different font systems. The overwhelming majority of user authorization algorithms use the Latin font for recognition of site visitors. Therefore, it is not possible to register "as in the passport". You need to translate your name and surname into the Latin alphabet and try to register as follows. It should be taken into account that the combination of the name and surname is repeated quite often, therefore it is recommended to add numbers, punctuation marks or additional letters to the user. Within the boundaries of one system there are no two equally registered users.
In various social networks, along with namesusers use digital identifiers that allow people to find each other. With the help of identifiers, the system helps organize personal information of the user within the system. So, a registered user can choose interesting information for him, listen to music, play computer games, go to social networks. All this is possible after the authorization of the user, you need only a password and user. What is very convenient, graphically shows statistics. Most visitors to social resources prefer to surround themselves with their own world, picking up like-minded people and friends.